We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Improving Local Collisions: New Attacks on Reduced SHA-256
Mendel F., Nad T., Schläffer M.
Advances in Cryptology – EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques , 262-278
Differential Cryptanalysis of Keccak Variants
Kölbl S., Mendel F., Nad T., Schläffer M.
Cryptography and Coding, 14th IMA International Conference on Cryptography and Coding, 141-157, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
Android Market Analysis with Activation Patterns
Teufl P., Kraxberger S., Orthacker C., Lackner G., Gissing M., Marsalek A., Leibetseder J., Prevenhueber O.
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers, 3rd ICST Conference on Security and Privacy for Mobile Information and Communication Systems, MobiSec 2011, 1-12, (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST)
Android Security Permissions - Can we trust them?
Orthacker C., Teufl P., Kraxberger S., Lackner G., Gissing M., Marsalek A., Leibetseder J., Prevenhueber O.
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers, 3rd ICST Conference on Security and Privacy for Mobile Information and Communication Systems, MobiSec 2011, 40-51, (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST)
Die physikalische Sicherheit eingebetteter Systeme
Mangard S.
Datenschutz und Datensicherheit, Vol. 36, 867-871
Exploiting the Difference of Side-Channel Leakages
Hutter M., Kirschbaum M., Plos T., Schmidt J., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings., International Workshop on Constructive Side-Channel Analysis and Secure Design, 1-16, (Lecture Notes in Computer Science)
Localized Electromagnetic Analysis of Cryptographic Implementations
Heyszl J., Mangard S., Heinz B., Stumpf F., Sigl G.
Cryptographers´ Track at the RSA Conference, 231-244
Trusted Location Based Services
Teufl P., Zefferer T., Kreuzhuber S., Lesjak C.
7th International Conference for Internet Technology and Secured Transactions, 7th International Conference for Internet Technology and Secured Transactions, 185-192
Parameterized Synthesis
Bloem R., Jacobs S.
Tools and Algorithms for the Construction and Analysis of Systems, International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 362-376, (Lecture notes in computer science)
Open Source Bausteine als Kooperationsgrundlage
Posch R., Orthacker C., Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
E-Government - Zwischen Partizipation und Kooperation, Springer, 185-209
Vertrauenswürdiges Open Government Data
Stranacher K., Krnjic V., Zefferer T.
1.OGD D-A-CH-LI Konferenz, OGD D-A-CH-LI Konferenz, 27-39
Usability-Evaluierung der österreichischen Handy-Signatur
Zefferer T., Krnjic V.
D-A-CH Security 2012, D-A-CH Security 2012, 365-376
Towards User-friendly E-Government Solutions: Usability Evaluation of Austrian Smart-Card Integration Techniques
Zefferer T., Krnjic V.
Advancing Democracy, Government and Governance, Springer, 88-102, (Lecture Notes in Computer Science)
The Prevalence of SAML within the European Union
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of the 8th International Conference on Web Information Systems and Technologies, 8th International Conference on Web Information Systems and Technologies, 571-576, (WEBIST)
Improving the Security of SMS-Based Services Using Electronic Signatures
Zefferer T., Tauber A., Zwattendorfer B.
International Conference on Web Information Systems and Technologies, 8th International Conference on Web Information Systems and Technologies, 743-752
Usability Evaluation of Electronic Signature Based E-Government Solutions
Zefferer T., Krnjic V.
Proceedings of the IADIS International Conference WWW/INTERNET 2012, IADIS WWW/Internet 2012 (ICWI 2012), 227-234
STORK - Technical Approach and Privacy
Leitold H., Posch R.
Digital Enlightenment Yearbook 2012, IOS Press, 289-306